Risk-Aware Rapid Data Evacuation for Large- Scale Disasters in Optical Cloud Networks

Size: px
Start display at page:

Download "Risk-Aware Rapid Data Evacuation for Large- Scale Disasters in Optical Cloud Networks"

Transcription

1 Risk-Aware Rapid Data Evacuation for Large- Scale Disasters in Optical Cloud Networks Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China Group Meeting, Friday, August 26, 2016

2 Outline 1. Background 2. Risk-Aware Rapid Data Evacuation For Large- Scale Disasters 3. Heuristic Algorithm 4. Performance Evaluation 5. Conclusion 6. Future Work 2

3 Background Enterprises deploy their cloud services such as cloud data storage and applications in distributed datacenter (DC) networks. Cloud services require Terabytes or Petabytes of data transfer. Optical networks can be used to facilitate data transfers. Advantage: high bandwidth and low latency in inter-dc networks. Disadvantage: services can be disrupted by disasters (such as earthquakes, tornadoes, and intentional attacks). A large-scale disaster can lead to high data loss and service disruptions Japan Earthquake damaged many cloud providers data. 3

4 Background (contd.) Provide redundancy (and protection) against data loss. Distributed content/service replicas in different DCs. All replicas of a content can be lost in a large-scale disaster. Critical data must be quickly evacuated from DCs in the disaster region to safe DCs prior to the disaster. Rapid data evacuation. Receive warning of an oncoming disaster from various sensors and monitors in their network and/or from government or intelligence agencies. Depending on the type of disaster (e.g., earthquake, hurricane or weapons of mass destruction (WMD)), do the following prediction. Disaster zone Evacuation deadline Potential damage in the infrastructure Before deadline, quickly evacuate as much critical data as possible. 4

5 Background (contd.) Safe data transfers Possible independent disasters may compromise the process of data evacuation. Risk of node/link failures must be considered to ensure safe data transfers. How to objective a tradeoff between evacuation time and risk of data loss during evacuation. 5

6 Risk-Aware Rapid Data Evacuation For Large-Scale Disasters (contd.) Time delay Path-computation delay. Connection-setup delay. Data-transmission delay. Data-propagation delay. Notations Distance of path: l. Number of hops on path: n. Bandwidth of path: B p Propagation delay per unit distance: μ. Processing delay: η. Switch configuration delay: β. Assume the same propagation delay for data and control messages. 6

7 Risk-Aware Rapid Data Evacuation For Large-Scale Disasters (contd.) Equations Connection-setup delay Control-message processing delay: (n +1) η Control-message propagation delay: l μ Switch-configuration delay: (n + 1) β Transmission delay: F c B p Propagation delay: l μ 7

8 Risk-Aware Rapid Data Evacuation For Large-Scale Disasters (contd.) The risk of node/link failures rrrr l m /rrrr n m are the probabilities of link l or node n being damaged due to disasterm M. l L,m M(1 rrrr m l ) n N,m M (1 rrrr m n ) computes the probability that all links and nodes are not damaged by any disaster. Path failure probability: rrrr p = 1 l L,m M(1 rrrr m l ) n N,m M (1 rrrr m n ). 8

9 Risk-Aware Rapid Data Evacuation For Large-Scale Disasters (contd.) Example Transfer content c1 from node C to safe DCs A or D as fast as possible. Failure probabilities of links C-D and A-C is assumed as 0.6 and 0.2. Select destination DC D Evacuation time is less but the risk along path C-D is higher. Select destination DC A Evacuation time is high but the risk along path C-D is less. 9

10 Risk-Aware Rapid Data Evacuation For Large-Scale Disasters (contd.) Problem statement Objective: Achieve an optimal tradeoff between evacuation time and risk of data loss during evacuation. Given inputs: N is the set of nodes and L is the set of links. Physical topology G = (N, L). Set of possible disaster zones M. Set of predicted WMD attack zones WW. Set of DCs D. Storage capacity S d. Set of locally hosted contents C d. Number of replicas of content c R c. Importance metric of content c α c. 10

11 Risk-Aware Rapid Data Evacuation For Large-Scale Disasters (contd.) Problem statement Input: Size of content c F c. Residual link capacity B l, l L. Evacuation deadline T. Set of k-shortest paths R ii for each node pair (i, j), i, j N. Constraint: Available link capacity is limited. Data-transfer delay to be upper bounded by evacuation deadline. Different paths can be used in parallel for different connections if paths do not overlap. 11

12 Heuristic Algorithm Disaster mapping: Get a set of DCs D ww D, ww WW. // Datacenters in predicted disaster zone Get a set of DCs D ooo_ww D, D ooo_ww = D D ww. // Datacenters outside predicted disaster zone Content selection: For each DC d D ww Get a set of contents, C d, d D ww, C ww = C ww C d, ww WW. // Contents in predicted disaster zone For each content c C ww If all replicas of content c are in the disaster zone WW then Put c in a content list C EEE and get set of DCs D c, which host the replicas of c. // C EEE is a set of contents to be evacuated Sort C EEE based on α c in a descending order. 12

13 Heuristic Algorithm Destination DC selection and path delay and risk computation: For each content c C EEE For each d D ooo_ww, if F c S d then put d into list of available DCs D AAA // D AAA is a set of safe DCs with available storage Get set of k-shortest paths R ii, i D c,j D AAA For each path p R ii Obtain total delay ddddd p and risk rrrr p to calculate general cost CCCC p CCCC p = ddddd p + φ rrrr p Set path p which has minimum cost CCCC p as final solution 13

14 Performance Evaluation Simulation conditions Network topology: 24-node USNET topology. Disaster type: WMD attacks. A predicted WMD zone: WM A set of 10 possible independent disaster zones: M. Blue nodes represent safe DCs. Red nodes 6, 9, and 12 are the DCs in the WMD zone WM. 14

15 Performance Evaluation (contd.) Large storage capacity ranging from 10TB to 100TB (average occupation is assumed to be 40%). Residual link capacity is assumed to range from 500Gbps to 1Tbps (network is assumed to have 30% utilization). Number of contents is assumed to be 300. Size of each content is randomly generated within the range of [100GB, 200GB]. The contents are uniformly distributed among different DCs with the number of replicas ranging from 2 to 4. Contents are randomly assigned the importance metric α c on a scale from 1 to 10. Processing delay, propagation delay, and switch configuration delay to be 10 μs, 5 μs/km, 15 ms. 15

16 Performance Evaluation (contd.) Total risk of data loss and evacuation time Time consumption (s) Weight factor ϕ Shows the time consumption and the total risk of data loss for the RA-RDE algorithm with an increasing weight factor φ. We see that RA-RDE can significantly reduce the total risk with an increasing φ. This is reasonable since a larger weight factor can lead to higher risk reduction in the general cost Total risk of data loss 16

17 Performance Evaluation (contd.) Performance comparison Result gap compared with LD-RDE 60.00% 50.00% 40.00% 30.00% 20.00% 10.00% Time consumption Total risk of data loss 0.00% Weight factor ϕ Compare the performance of RA-RDE with the LD-RDE algorithm which selects the least-delay paths for data evacuation without considering risk. It should be noted that the RA-RDE algorithm is equivalent to the LD-RDE scheme when φ = 0. We see that, when φ = 3, our approach reduces the total risk by 20% and needs less than 10% additional time consumption. 17

18 Performance Evaluation (contd.) Time consumption with an increasing number of contents Time consumption (s) Number of contents 18 NDE RA-RDE LD-RDE Compare time consumption of the two rapid evacuation approaches with the nearest data evacuation (NDE) approach which evacuates data only to the nearest DC. With an increasing number of contents from 100 to 500 and φ = 3, we can see that RA-RDE performs close to LD-RDE and is much better than NDE, which verifies its time efficiency.

19 Conclusion To balance performance between time consumption and total risk of data loss, we defined a general cost considering path delay and path risk using a weight factor. We develop a risk-aware rapid data evacuation scheme for largescale disasters in optical cloud networks. Results show that proposed approach significantly reduces total risk with minimal addition time consumption. Time consumption close to LD-RDE under different number of contents. 19

20 Future Work Try to propose an MILP model to solve the rapid data evacuation problem by using time slot Time slot contiguity Time slot continuity C1 C2 12 Time slot T Investigate an new heuristic algorithms with the ICC paper of Wu Yu 20

21 Thank you for your attention! Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China Group Meeting, Friday, August 26,

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China

More information

Data Center Network Placement and Data Backup Against Region Failures

Data Center Network Placement and Data Backup Against Region Failures Data Center Network Placement and Data Backup Against Region Failures by Lisheng Ma A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Graduate

More information

Towards Deadline Guaranteed Cloud Storage Services Guoxin Liu, Haiying Shen, and Lei Yu

Towards Deadline Guaranteed Cloud Storage Services Guoxin Liu, Haiying Shen, and Lei Yu Towards Deadline Guaranteed Cloud Storage Services Guoxin Liu, Haiying Shen, and Lei Yu Presenter: Guoxin Liu Ph.D. Department of Electrical and Computer Engineering, Clemson University, Clemson, USA Computer

More information

Sleep/Wake Aware Local Monitoring (SLAM)

Sleep/Wake Aware Local Monitoring (SLAM) Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and

More information

An Ant-Based Routing Algorithm to Achieve the Lifetime Bound for Target Tracking Sensor Networks

An Ant-Based Routing Algorithm to Achieve the Lifetime Bound for Target Tracking Sensor Networks An Ant-Based Routing Algorithm to Achieve the Lifetime Bound for Target Tracking Sensor Networks Peng Zeng Cuanzhi Zang Haibin Yu Shenyang Institute of Automation Chinese Academy of Sciences Target Tracking

More information

Multiple Virtual Network Function Service Chain Placement and Routing using Column Generation

Multiple Virtual Network Function Service Chain Placement and Routing using Column Generation Multiple Virtual Network Function Service Chain Placement and Routing using Column Generation BY ABHISHEK GUPTA FRIDAY GROUP MEETING NOVEMBER 11, 2016 Virtual Network Function (VNF) Service Chain (SC)

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

CQNCR: Optimal VM Migration Planning in Cloud Data Centers

CQNCR: Optimal VM Migration Planning in Cloud Data Centers CQNCR: Optimal VM Migration Planning in Cloud Data Centers Presented By Md. Faizul Bari PhD Candidate David R. Cheriton School of Computer science University of Waterloo Joint work with Mohamed Faten Zhani,

More information

AS the increasing number of smart devices and various

AS the increasing number of smart devices and various 1 Virtual Machine Migration Planning in Software-Defined Networks Huandong Wang, Yong Li, Member, IEEE, Ying Zhang, Member, IEEE, Depeng Jin, Member, IEEE, Abstract Live migration is a key technique for

More information

Virtual Network Embedding with Substrate Support for Parallelization

Virtual Network Embedding with Substrate Support for Parallelization Virtual Network Embedding with Substrate Support for Parallelization Sheng Zhang, Nanjing University, P.R. China Jie Wu, Temple University, USA Sanglu Lu, Nanjing University, P.R. China Presenter: Pouya

More information

Deadline Guaranteed Service for Multi- Tenant Cloud Storage Guoxin Liu and Haiying Shen

Deadline Guaranteed Service for Multi- Tenant Cloud Storage Guoxin Liu and Haiying Shen Deadline Guaranteed Service for Multi- Tenant Cloud Storage Guoxin Liu and Haiying Shen Presenter: Haiying Shen Associate professor *Department of Electrical and Computer Engineering, Clemson University,

More information

Data Sheet FUJITSU Storage ETERNUS CD10000 S2 Hyperscale Storage

Data Sheet FUJITSU Storage ETERNUS CD10000 S2 Hyperscale Storage Data Sheet FUJITSU Storage ETERNUS CD10000 S2 Hyperscale Storage Data Sheet FUJITSU Storage ETERNUS CD10000 S2 Hyperscale Storage The hyper-scale, software-defined storage system for the cloud ETERNUS

More information

Global Leased Line Service

Global Leased Line Service SERVICE BROCHURE Global Leased Line Service from NTT Communications Predictable, low latency global networking with the highest quality A global managed bandwidth solution from NTT Communications (NTT

More information

Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE j Networks

Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE j Networks Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE 802.16j Networks Shimpei Tanaka Graduate School of Information Science and Technology Osaka University, Japan sinpei-t@ist.osaka-u.ac.jp

More information

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS 1 JAMES SIMS, 2 NATARAJAN MEGHANATHAN 1 Undergrad Student, Department

More information

Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video

Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video The future of video is in the network We live in a world where more and more video is shifting to IP and mobile.

More information

Modeling and Optimization of Resource Allocation in Cloud

Modeling and Optimization of Resource Allocation in Cloud PhD Thesis Progress First Report Thesis Advisor: Asst. Prof. Dr. Tolga Ovatman Istanbul Technical University Department of Computer Engineering January 8, 2015 Outline 1 Introduction 2 Studies Time Plan

More information

Enterprise GRC Implementation

Enterprise GRC Implementation Enterprise GRC Implementation Our journey so far implementation observations and learning points Derek Walker Corporate Risk Manager National Grid 1 Introduction to National Grid One of the world s largest

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

8. CONCLUSION AND FUTURE WORK. To address the formulated research issues, this thesis has achieved each of the objectives delineated in Chapter 1.

8. CONCLUSION AND FUTURE WORK. To address the formulated research issues, this thesis has achieved each of the objectives delineated in Chapter 1. 134 8. CONCLUSION AND FUTURE WORK 8.1 CONCLUSION Virtualization and internet availability has increased virtualized server cluster or cloud computing environment deployments. With technological advances,

More information

Railroad Infrastructure Security

Railroad Infrastructure Security TRB Annual Meeting January 14, 2002 Session 107 - Railroad Security William C. Thompson william.thompson@jacobs.com 402-697-5011 Thanks to: Bob Ulrich Dr. William Harris Byron Ratcliff Frank Thigpen John

More information

Crosstalk-Aware Spectrum Defragmentation based on Spectrum Compactness in SDM-EON

Crosstalk-Aware Spectrum Defragmentation based on Spectrum Compactness in SDM-EON Crosstalk-Aware Spectrum Defragmentation based on Spectrum Compactness in SDM-EON Yongli Zhao State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications

More information

DEPARTMENT of. Computer & Information Science & Engineering

DEPARTMENT of. Computer & Information Science & Engineering CIS-6930: Distributed Multimedia Systems Enhancing aggregate QoS for video streaming Authors: Chung wei Lee, Randy Chow, Jonathan C.L. Liu Aditi Malviya Presented By: Anubha DEPARTMENT of Computer & Information

More information

Emergency Response for Demand Response Transportation Systems

Emergency Response for Demand Response Transportation Systems Emergency Response for Demand Response Transportation Systems Trapeze Rapid Response North America Copyright 2011 Trapeze Software Inc., its subsidiaries and affiliates. All rights reserved. March 22,

More information

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks Qiaoqin Li 12, Mei Yang 1, Hongyan Wang 1, Yingtao Jiang 1, Jiazhi Zeng 2 1 Department

More information

The Impact of Control Path Survivability on Data Plane Survivability in SDN. Sedef Savas Networks Lab, Group Meeting Aug 11, 2017

The Impact of Control Path Survivability on Data Plane Survivability in SDN. Sedef Savas Networks Lab, Group Meeting Aug 11, 2017 The Impact of Control Path Survivability on Data Plane Survivability in SDN Sedef Savas Networks Lab, Group Meeting Aug 11, 2017 1 1 1 3 2 4 3 2 4 6 6 5 5 7 7 a) 9-node network topology, controller is

More information

Scale-Out Architectures with Brocade DCX 8510 UltraScale Inter-Chassis Links

Scale-Out Architectures with Brocade DCX 8510 UltraScale Inter-Chassis Links Scale-Out Architectures with Brocade DCX 8510 UltraScale Inter-Chassis Links The Brocade DCX 8510 Backbone with Gen 5 Fibre Channel offers unique optical UltraScale Inter-Chassis Link (ICL) connectivity,

More information

Simplifying Collaboration in the Cloud

Simplifying Collaboration in the Cloud Simplifying Collaboration in the Cloud WOS and IRODS Data Grid Dave Fellinger dfellinger@ddn.com Innovating in Storage DDN Firsts: Streaming ingest from satellite with guaranteed bandwidth Continuous service

More information

The Impact of SSD Selection on SQL Server Performance. Solution Brief. Understanding the differences in NVMe and SATA SSD throughput

The Impact of SSD Selection on SQL Server Performance. Solution Brief. Understanding the differences in NVMe and SATA SSD throughput Solution Brief The Impact of SSD Selection on SQL Server Performance Understanding the differences in NVMe and SATA SSD throughput 2018, Cloud Evolutions Data gathered by Cloud Evolutions. All product

More information

Resilient Communications: Staying connected during a disaster.

Resilient Communications: Staying connected during a disaster. Resilient Communications: Staying connected during a disaster. A presentation by the Telecommunications Services of Trinidad and Tobago Limited (TSTT) on behalf of CANTO Agenda Resilient Telecommunication

More information

Scaling to Petaflop. Ola Torudbakken Distinguished Engineer. Sun Microsystems, Inc

Scaling to Petaflop. Ola Torudbakken Distinguished Engineer. Sun Microsystems, Inc Scaling to Petaflop Ola Torudbakken Distinguished Engineer Sun Microsystems, Inc HPC Market growth is strong CAGR increased from 9.2% (2006) to 15.5% (2007) Market in 2007 doubled from 2003 (Source: IDC

More information

Adapting Enterprise Distributed Real-time and Embedded (DRE) Pub/Sub Middleware for Cloud Computing Environments

Adapting Enterprise Distributed Real-time and Embedded (DRE) Pub/Sub Middleware for Cloud Computing Environments Adapting Enterprise Distributed Real-time and Embedded (DRE) Pub/Sub Middleware for Cloud Computing Environments Joe Hoffert, Douglas Schmidt, and Aniruddha Gokhale Vanderbilt University Nashville, TN,

More information

Presenter: Wei Chang4

Presenter: Wei Chang4 Quan Yuan1, Ionut Cardei2, Jing Chen3, and Jie Wu4 Presenter: Wei Chang4 University of Texas-Permian Basin1, Florida Atlantic University2 Wuhan University3,Temple University4 } Background } Motivation

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

Application of Cloud Computing in Hazardous Mechanical Industries

Application of Cloud Computing in Hazardous Mechanical Industries International Journal of Advancements in Research & Technology, Volume 2, Issue4, April 2013 482 By Application of Cloud Computing in Hazardous Mechanical Industries Dipankar Mishra Dept of Electronics

More information

DCRoute: Speeding up Inter-Datacenter Traffic Allocation while Guaranteeing Deadlines

DCRoute: Speeding up Inter-Datacenter Traffic Allocation while Guaranteeing Deadlines DCRoute: Speeding up Inter-Datacenter Traffic Allocation while Guaranteeing Deadlines Mohammad Noormohammadpour, Cauligi S. Raghavendra Ming Hsieh Department of Electrical Engineering University of Southern

More information

Randomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching

Randomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching Randomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching An Liu, Vincent LAU and Wei Han the Hong Kong University of Science and Technology Background 2 Cloud Radio Access Networks

More information

PCAP: Performance-Aware Power Capping for the Disk Drive in the Cloud

PCAP: Performance-Aware Power Capping for the Disk Drive in the Cloud PCAP: Performance-Aware Power Capping for the Disk Drive in the Cloud Mohammed G. Khatib & Zvonimir Bandic WDC Research 2/24/16 1 HDD s power impact on its cost 3-yr server & 10-yr infrastructure amortization

More information

Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application. Ling Wang

Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application. Ling Wang Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application Ling Wang ling.wang2@wayne.edu Outline Introduction Parameterization Differentiation Evaluation

More information

Disaster Recovery and Mitigation: Is your business prepared when disaster hits?

Disaster Recovery and Mitigation: Is your business prepared when disaster hits? 1 Disaster Recovery and Mitigation: Is your business prepared when disaster hits? 2 Our speaker today: Catherine Roy, Director of PMO at Hosting 15 years Project Management experience At HOSTING since

More information

White Paper: Next generation disaster data infrastructure CODATA LODGD Task Group 2017

White Paper: Next generation disaster data infrastructure CODATA LODGD Task Group 2017 White Paper: Next generation disaster data infrastructure CODATA LODGD Task Group 2017 Call for Authors This call for authors seeks contributions from academics and scientists who are in the fields of

More information

Lightning Fast Rock Solid

Lightning Fast Rock Solid Lightning Fast Rock Solid OceanStor Dorado V3 all-flash storage is the ideal storage solution to handle mission-critical businesses for TM enterprises and organizations. Based on Huawei's unique FlashLink

More information

CHAPTER 6 ENERGY AWARE SCHEDULING ALGORITHMS IN CLOUD ENVIRONMENT

CHAPTER 6 ENERGY AWARE SCHEDULING ALGORITHMS IN CLOUD ENVIRONMENT CHAPTER 6 ENERGY AWARE SCHEDULING ALGORITHMS IN CLOUD ENVIRONMENT This chapter discusses software based scheduling and testing. DVFS (Dynamic Voltage and Frequency Scaling) [42] based experiments have

More information

Deploying Multiple Service Chain (SC) Instances per Service Chain BY ABHISHEK GUPTA FRIDAY GROUP MEETING APRIL 21, 2017

Deploying Multiple Service Chain (SC) Instances per Service Chain BY ABHISHEK GUPTA FRIDAY GROUP MEETING APRIL 21, 2017 Deploying Multiple Service Chain (SC) Instances per Service Chain BY ABHISHEK GUPTA FRIDAY GROUP MEETING APRIL 21, 2017 Virtual Network Function (VNF) Service Chain (SC) 2 Multiple VNF SC Placement and

More information

Performance Evaluation of CoAP and UDP using NS-2 for Fire Alarm System

Performance Evaluation of CoAP and UDP using NS-2 for Fire Alarm System Indian Journal of Science and Technology, Vol 9(20), DOI: 10.17485/ijst/2016/v9i20/92603, May 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Performance Evaluation of CoAP and UDP using NS-2 for

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

CS 498 Hot Topics in High Performance Computing. Networks and Fault Tolerance. 9. Routing and Flow Control

CS 498 Hot Topics in High Performance Computing. Networks and Fault Tolerance. 9. Routing and Flow Control CS 498 Hot Topics in High Performance Computing Networks and Fault Tolerance 9. Routing and Flow Control Intro What did we learn in the last lecture Topology metrics Including minimum diameter of directed

More information

Aggregation on the Fly: Reducing Traffic for Big Data in the Cloud

Aggregation on the Fly: Reducing Traffic for Big Data in the Cloud Aggregation on the Fly: Reducing Traffic for Big Data in the Cloud Huan Ke, Peng Li, Song Guo, and Ivan Stojmenovic Abstract As a leading framework for processing and analyzing big data, MapReduce is leveraged

More information

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) Ngo Duc Thuan 1,, Hiroki Nishiyama 1, Nirwan Ansari 2,andNeiKato 1 1 Graduate School of Information

More information

Network Adaptability under Resource Crunch. Rafael Braz Rebouças Lourenço Networks Lab - UC Davis Friday Lab Meeting - April 7th, 2017

Network Adaptability under Resource Crunch. Rafael Braz Rebouças Lourenço Networks Lab - UC Davis Friday Lab Meeting - April 7th, 2017 Network Adaptability under Resource Crunch Rafael Braz Rebouças Lourenço Networks Lab - UC Davis Friday Lab Meeting - April 7th, 2017 Outline What is Resource Crunch Problem Statement Example 1 Connection

More information

The Storage Industry s Need for Power Efficient Storage. Marty Finkbeiner Senior Vice President Engineering Western Digital Corporation

The Storage Industry s Need for Power Efficient Storage. Marty Finkbeiner Senior Vice President Engineering Western Digital Corporation The Storage Industry s Need for Power Efficient Storage Marty Finkbeiner Senior Vice President Engineering Western Digital Corporation Agenda Storage expansion and it s constraints EPA issues report on

More information

On the Robustness of Distributed Computing Networks

On the Robustness of Distributed Computing Networks 1 On the Robustness of Distributed Computing Networks Jianan Zhang, Hyang-Won Lee, and Eytan Modiano Lab for Information and Decision Systems, Massachusetts Institute of Technology, USA Dept. of Software,

More information

Disaster-Resilient Control Plane Design and Mapping in Software-Defined Networks

Disaster-Resilient Control Plane Design and Mapping in Software-Defined Networks Disaster-Resilient Control Plane Design and Mapping in Software-Defined Networks S. Sedef Savas 1, Massimo Tornatore 1, 2, M. Farhan Habib 1, Pulak Chowdhury 1, and Biswanath Mukherjee 1 1 University of

More information

CANVAS DISASTER RECOVERY PLAN AND PROCEDURES

CANVAS DISASTER RECOVERY PLAN AND PROCEDURES CANVAS DISASTER RECOVERY PLAN AND PROCEDURES Instructure Security, Engineering, and Operations INSTRUCTURE, INC. 6330 South 3000 East Salt Lake City, Utah 84121 Table of Contents Disaster Plan and Procedures...

More information

Routing in Delay Tolerant Networks (2)

Routing in Delay Tolerant Networks (2) Routing in Delay Tolerant Networks (2) Primary Reference: E. P. C. Jones, L. Li and P. A. S. Ward, Practical Routing in Delay-Tolerant Networks, SIGCOMM 05, Workshop on DTN, August 22-26, 2005, Philadelphia,

More information

White paper ETERNUS CS800 Data Deduplication Background

White paper ETERNUS CS800 Data Deduplication Background White paper ETERNUS CS800 - Data Deduplication Background This paper describes the process of Data Deduplication inside of ETERNUS CS800 in detail. The target group consists of presales, administrators,

More information

Dell Compellent Storage Center and Windows Server 2012/R2 ODX

Dell Compellent Storage Center and Windows Server 2012/R2 ODX Dell Compellent Storage Center and Windows Server 2012/R2 ODX A Dell Technical Overview Kris Piepho, Microsoft Product Specialist October, 2013 Revisions Date July 2013 October 2013 Description Initial

More information

Oracle NoSQL Database Overview Marie-Anne Neimat, VP Development

Oracle NoSQL Database Overview Marie-Anne Neimat, VP Development Oracle NoSQL Database Overview Marie-Anne Neimat, VP Development June14, 2012 1 Copyright 2012, Oracle and/or its affiliates. All rights Agenda Big Data Overview Oracle NoSQL Database Architecture Technical

More information

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2 CS5984 Mobile Computing Outline : a Survey Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech An Introduction to 1 2 1/2 Advances in micro-electro-mechanical systems technology, wireless communications,

More information

Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks

Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks Jing He, Shouling Ji, Mingyuan Yan, Yi Pan, and Yingshu Li Department of Computer Science Georgia State University,

More information

Dynamic Grouping Strategy in Cloud Computing

Dynamic Grouping Strategy in Cloud Computing IEEE CGC 2012, November 1-3, Xiangtan, Hunan, China Dynamic Grouping Strategy in Cloud Computing Presenter : Qin Liu a Joint work with Yuhong Guo b, Jie Wu b, and Guojun Wang a a Central South University,

More information

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University

More information

On the Robustness of Distributed Computing Networks

On the Robustness of Distributed Computing Networks 1 On the Robustness of Distributed Computing Networks Jianan Zhang, Hyang-Won Lee, and Eytan Modiano Lab for Information and Decision Systems, Massachusetts Institute of Technology, USA Dept. of Software,

More information

Oracle Argus Cloud Service Service Descriptions and Metrics

Oracle Argus Cloud Service Service Descriptions and Metrics Oracle Argus Service Descriptions and Metrics January 25, 2018 Table of Contents Metric Definitions... 2 Case... 2 Instance... 2 Glossary... 2 Non-Production Environment... 2 Production Environment...

More information

What's in this guide... 4 Documents related to NetBackup in highly available environments... 5

What's in this guide... 4 Documents related to NetBackup in highly available environments... 5 Contents Chapter 1 About in this guide... 4 What's in this guide... 4 Documents related to NetBackup in highly available environments... 5 Chapter 2 NetBackup protection against single points of failure...

More information

Splitter Placement in All-Optical WDM Networks

Splitter Placement in All-Optical WDM Networks plitter Placement in All-Optical WDM Networks Hwa-Chun Lin Department of Computer cience National Tsing Hua University Hsinchu 3003, TAIWAN heng-wei Wang Institute of Communications Engineering National

More information

Survivable Routing in Multi-domain Optical Networks with Geographically Correlated Failures

Survivable Routing in Multi-domain Optical Networks with Geographically Correlated Failures Survivable Routing in Multi-domain Optical Networks with Geographically Correlated Failures Riti Gour, Jian Kong, Genya Ishigaki, Ashkan Yousefpour, Sangjin Hong, and Jason P. Jue The University of Texas

More information

Master s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006

Master s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006 Master s Thesis Title Cross-Layer Traffic Engineering in IP over WDM Networks Supervisor Professor Masayuki Murata Author Yuki Koizumi February 15th, 2006 Graduate School of Information Science and Technology

More information

TELCOM2125: Network Science and Analysis

TELCOM2125: Network Science and Analysis School of Information Sciences University of Pittsburgh TELCOM2125: Network Science and Analysis Konstantinos Pelechrinis Spring 2015 Figures are taken from: M.E.J. Newman, Networks: An Introduction 2

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

Automated Harvesting of Loss and Damage Information from Open Sources

Automated Harvesting of Loss and Damage Information from Open Sources Automated Harvesting of Loss and Damage Information from Open Sources Mao Kezhi School of Electrical and Electronic Engineering Nanyang Technological University ekzmao@ntu.edu.sg 04 August 2017 Mao Kezhi

More information

CHAPTER 4: ROUTING DYNAMIC. Routing & Switching

CHAPTER 4: ROUTING DYNAMIC. Routing & Switching CHAPTER 4: ROUTING DYNAMIC Routing & Switching CHAPTER4 4.1 Dynamic Routing Protocols 4.2 Distance Vector Dynamic Routing 4.3 RIP and RIPng Routing 4.4 Link-State Dynamic Routing 4.5 The Routing Table

More information

Zonal based Deterministic Energy Efficient Clustering Protocol for WSNs

Zonal based Deterministic Energy Efficient Clustering Protocol for WSNs Zonal based Deterministic Energy Efficient Clustering Protocol for WSNs Prabhleen Kaur Punjab Institute of Technology, Kapurthala (PTU Main Campus), Punjab India ABSTRACT Wireless Sensor Network has gained

More information

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.

More information

Global Crisis Management at Target

Global Crisis Management at Target 2011/EPWG/WKSP/008 Session 1 Global Crisis Management at Target Submitted by: Target Workshop on Private Sector Emergency Preparedness Sendai, Japan 1-3 August 2011 Global Crisis Management at Target Bryan

More information

Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model

Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model HIROMICHI SUGIYAMA YUKINOBU FUKUSHIMA TOKUMI YOKOHIRA The Graduate School of Natural Science

More information

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Pouya Ostovari Department of Computer and Information Siences Temple University Philadelphia, Pennsylvania, USA Email: ostovari@temple.edu

More information

Application Provisioning in Fog Computingenabled Internet-of-Things: A Network Perspective

Application Provisioning in Fog Computingenabled Internet-of-Things: A Network Perspective Application Provisioning in Fog Computingenabled Internet-of-Things: A Network Perspective Ruozhou Yu, Guoliang Xue, and Xiang Zhang Arizona State University Outlines Background and Motivation System Modeling

More information

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts

More information

Outline. Introduction. Outline. Introduction (Cont.) Introduction (Cont.)

Outline. Introduction. Outline. Introduction (Cont.) Introduction (Cont.) An Energy-Efficient Distributed Algorithm for Minimum-Latency Aggregation Scheduling in Wireless Sensor Networks Yingshu Li, Longjiang Guo, and Sushil K. Prasad Department of Computer Science, Georgia

More information

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor

More information

Virtualizing SQL Server 2008 Using EMC VNX Series and VMware vsphere 4.1. Reference Architecture

Virtualizing SQL Server 2008 Using EMC VNX Series and VMware vsphere 4.1. Reference Architecture Virtualizing SQL Server 2008 Using EMC VNX Series and VMware vsphere 4.1 Copyright 2011, 2012 EMC Corporation. All rights reserved. Published March, 2012 EMC believes the information in this publication

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS

IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS Indu Shukla, Natarajan Meghanathan Jackson State University, Jackson MS, USA indu.shukla@jsums.edu,

More information

Cloud Connect. Gain highly secure, performance-optimized access to third-party public and private cloud providers

Cloud Connect. Gain highly secure, performance-optimized access to third-party public and private cloud providers Cloud Connect Gain highly secure, performance-optimized access to third-party public and private cloud providers of the workload to run in the cloud by 2018 1 60 % Today s enterprise WAN environments demand

More information

Citrix NetScaler LLB Deployment Guide

Citrix NetScaler LLB Deployment Guide Deployment Guide Citrix NetScaler Citrix NetScaler LLB Deployment Guide Deployment Guide for Using a NetScaler Appliance for Outbound Link Load Balancing www.citrix.com Contents Introduction... 3 Solution

More information

Optimizing Apache Spark with Memory1. July Page 1 of 14

Optimizing Apache Spark with Memory1. July Page 1 of 14 Optimizing Apache Spark with Memory1 July 2016 Page 1 of 14 Abstract The prevalence of Big Data is driving increasing demand for real -time analysis and insight. Big data processing platforms, like Apache

More information

Basic Switch Organization

Basic Switch Organization NOC Routing 1 Basic Switch Organization 2 Basic Switch Organization Link Controller Used for coordinating the flow of messages across the physical link of two adjacent switches 3 Basic Switch Organization

More information

DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC

DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC Zhou Ling 1, 2, Ding Wei-xiong 2 and Zhu Yu-xi 2 1 Department of Information Science and Engineer, Central South University,

More information

On the Latency-Accuracy Tradeoff in Approximate MapReduce Jobs

On the Latency-Accuracy Tradeoff in Approximate MapReduce Jobs On the Latency-Accuracy Tradeoff in Approximate apreduce Jobs Juan F. Pérez Universidad del Rosario, Colombia Robert Birke and Lydia Chen IB Research Zurich, Switzerland IEEE INFOCO ay, 2017 J. F. Pérez,

More information

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network Volume 118 No. 7 2018, 501-505 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu CASER Protocol Using DCFN Mechanism in Wireless Sensor Network A.Shirly

More information

The Construction of Open Source Cloud Storage System for Digital Resources

The Construction of Open Source Cloud Storage System for Digital Resources 2017 3rd International Conference on Electronic Information Technology and Intellectualization (ICEITI 2017) ISBN: 978-1-60595-512-4 The Construction of Open Source Cloud Storage System for Digital Resources

More information

HUAWEI TECHNOLOGIES CO., LTD. Huawei FireHunter6000 series

HUAWEI TECHNOLOGIES CO., LTD. Huawei FireHunter6000 series HUAWEI TECHNOLOGIES CO., LTD. Huawei 6000 series Huawei 6000 series can detect APT (Advanced Persistent Threat) attacks, which altogether exploit multiple techniques (including zero-day vulnerabilities

More information

Some problems in ad hoc wireless networking. Balaji Prabhakar

Some problems in ad hoc wireless networking. Balaji Prabhakar Some problems in ad hoc wireless networking Balaji Prabhakar Background Example scenarios for ad hoc packet networks - sensor networks (many nodes, low data rates) - wireless LANs (fewer nodes, high data

More information

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) Sekhar KONDEPUDI Ph.D. Vice Chair FG-SSC & Coordinator Working Group 1 ICT role and roadmap for

More information

The Tofu Interconnect D

The Tofu Interconnect D The Tofu Interconnect D 11 September 2018 Yuichiro Ajima, Takahiro Kawashima, Takayuki Okamoto, Naoyuki Shida, Kouichi Hirai, Toshiyuki Shimizu, Shinya Hiramoto, Yoshiro Ikeda, Takahide Yoshikawa, Kenji

More information

Wireless Internet Routing. Learning from Deployments Link Metrics

Wireless Internet Routing. Learning from Deployments Link Metrics Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data

More information

Demand-adaptive VNF placement and scheduling in optical datacenter networks. Speaker: Tao Gao 8/10/2018 Group Meeting Presentation

Demand-adaptive VNF placement and scheduling in optical datacenter networks. Speaker: Tao Gao 8/10/2018 Group Meeting Presentation Demand-adaptive VNF placement and scheduling in optical datacenter networks Speaker: Tao Gao 8/10/2018 Group Meeting Presentation Background High CAPEX and OPEX when deploying and updating network infrastructure,

More information

Application Placement and Demand Distribution in a Global Elastic Cloud: A Unified Approach

Application Placement and Demand Distribution in a Global Elastic Cloud: A Unified Approach Application Placement and Demand Distribution in a Global Elastic Cloud: A Unified Approach 1 Hangwei Qian, 2 Michael Rabinovich 1 VMware 2 Case Western Reserve University 1 Introduction System Environment

More information

RECENTLY virtualization technologies have been

RECENTLY virtualization technologies have been IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL., NO., FEBRUARY 216 1 Stochastic Load Balancing for Virtual Resource Management in Datacenters Lei Yu, Student Member, IEEE, Liuhua Chen, Student Member, IEEE,

More information